Error logging in the server is similar to this:
124.65.133.242––[27/oct/2014:14:30:51 +0800] "-" 400 0 "-" "-"124.65.133.242––[27/oct/2014:14:31:45 +0800] "-" 400 0 "-" "-"124.65.133.242––[27/oct/2014:14:31:45 +0800] "-" 400 0 "-" "-"124.65.133.242–
According to the actual work need, want to find out what you want from the visit log, such as files not found, from Google or from Yahoo or from other places, or search engine spider access. The principle is very simple is to open the file, filter
Typically, under the Bea/user_projects/domains/xxxdomain/servers/adminserver/logs directory, the file name is Access.log.
Usually there are access.log00001, access.log00002, access.log00003 and so on dozens of files, these files are a circular log
Jetty 9.2 Under Org.eclipse.jetty.NCSARequestLog, has been deleted, cannot find the item class, Web Access needs to be handled through ORG.ECLIPSE.JETTY.SERVER.ASYNCNCSAREQUESTLOG.
Modification Method:
To open the Jetty.home/etc/jetty.xml file,
I have a daily cut on the server nginx log habit, so for every day to visit the major search engines, can always record some 404 page information, traditionally I just occasionally analyze the log, but for a lot of log information friends, manual to
First, look at the Nginx version, I use the 1.9.7 version, the installation directory in/application/nginx-1.9.7
[Root@ansheng ~]#/application/nginx-1.9.7/sbin/nginx-v
nginx version:nginx/1.9.7 built by
GCC 4.4.7 20120313 (Red Hat 4.4.7-16) (
Scheduled backup MySQL
Put/etc/cron.hourly/
Copy Code code as follows:
#!/bin/bash
Dump=/usr/local/webserver/mysql/bin/mysqldump
out_dir=/data1/backup/
Db_name= database name
db_user= Database User
db_pass= Database
There are a large number of 400 errors in the Access.log, and an increase of hundreds of M per day, taking up a lot of space.
Copy Code code as follows:
Tail-f/opt/nginx/logs/access.log
116.236.228.180--[15/dec/2010:11:00:15 +0800] "-"
1. Check whether the webshell Trojan is placed in the root directory of the site. check whether it is a PHP Trojan script based on the statement.# Find/storage/www/-name "*. php" | xargs grep-in -- color "eval ("# Grep-I -- include = '*. php'-r
Common troubleshooting command lines in linux 1. view TCP connection status netstat-nat | awk '{print $6}' | sort | uniq-c | sort-rnnetstat-n | awk '/^ tcp/{++ S [$ NF]}; END {for (a in S) print a, S [a]} 'netstat-n | awk'/^ tcp/{++ state [$ NF]};
View system connection status in CentOS
1. View TCP connection status
Netstat-nat | awk '{print $6}' | sort | uniq-c | sort-rn
Netstat-n | awk '/^ tcp/{++ S [$ NF]}; END {for (a in S) print a, S [a]}' orNetstat-n | awk '/^ tcp/{++ state [$ NF]}; END
For the use of Apache logs in php, the submitted website contains php statements, which are then recorded by the Apache server, and then included and executed by php. Of course, the biggest drawback of this method is that Apache logs will certainly
1. check whether webshell Trojans are placed in the root directory of the site. determine if they are PHP Trojan scripts based on the statement # find/storage/www/-name & quot ;*. php & quot; | xargsgrep-in -- color & quot; eval (& quot; # grep-I --
1. check whether webshell Trojans are placed in the root directory of the site. determine if they are PHP Trojan scripts based on the statement # find/storage/www/-name & quot ;*. php & quot; | xargsgrep-in -- color & quot; eval (& quot; # grep-I --
1. Check whether the webshell Trojan is placed in the root directory of the site. check whether it is a PHP Trojan script based on the statement.# Find/storage/www/-name "*. php" | xargs grep-in -- color "eval ("# Grep-I -- include = '*. php'-r
Nginx log and monitoring
Address: http://nginx.com/resources/admin-guide/logging-and-monitoring/Logging and Monitoring
Log and monitoring
This section describes how to configure logging of errors and processed requests, as well as how to use the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.